Sidechain technologies in blockchain networks: An examination and state-of-the-art review

Abstract In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. In recent times, however, blockchain-based systems have faced stumbling blocks in the form of challenges related to scalability, privacy, security, etc. Several new methods have been proposed both by the research and professional communities to mitigate these challenges. One such recent advancement proposed is the use of sidechains. A sidechain is a secondary blockchain connected to the main blockchain with a two-way peg. Sidechains may have their own consensus protocols, which could be completely different from the mainchain's protocol. Theoretically, a sidechain can add new functionalities, improve privacy, and security of traditionally vanilla blockchains. To this date, however, little is known or discussed regarding factors related to design choices, feasibility, limitations and other issues in adopting the sidechain technology. Moreover, there is a lack of studies discussing how and where it can effectively be integrated into blockchains to remedy current issues in a clear context. Hence, this paper provides the first comprehensive review of the state-of-the-art sidechains and platforms, identifying current advancements and analyzing their impact from various viewpoints, highlighting their limitations and discussing possible remedies for the overall improvement of the blockchain domain.

[1]  Jing Zeng,et al.  Research on Cross-Chain Technology Based on Sidechain and Hash-Locking , 2018, EDGE.

[2]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[3]  Kusprasapta Mutijarsa,et al.  Block Summarization and Compression in Bitcoin Blockchain , 2018, 2018 International Symposium on Electronics and Smart Devices (ISESD).

[4]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[5]  Marta Piekarska,et al.  Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks , 2016, ArXiv.

[6]  Hyuk Lim,et al.  Random Mining Group Selection to Prevent 51% Attacks on Bitcoin , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).

[7]  Bo Zhang,et al.  A High Performance Blockchain Platform for Intelligent Devices , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[8]  Nikhil Swamy,et al.  Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.

[9]  Yu Wei,et al.  A Multiple Blockchains Architecture on Inter-Blockchain Communication , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[10]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[11]  Jega Anish Dev Bitcoin mining acceleration and performance quantification , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[12]  Qichao Zhang,et al.  A Blockchain-based key Management Scheme for Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[13]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[14]  Mariia Rodinko,et al.  Analysis of splitting attacks on Bitcoin and GHOST consensus protocols , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[15]  Emin Gün Sirer,et al.  Majority is not enough , 2013, Financial Cryptography.

[16]  R. Manoharan,et al.  Security Enhancement In Bitcoin Protocol , 2018, 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[17]  Ali Dehghantanha,et al.  Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security , 2018, ICBC.

[18]  Christoph M. Friedrich,et al.  Proof-of-Property - A Lightweight and Scalable Blockchain Protocol , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).

[19]  Anamika Chauhan,et al.  Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[20]  Dennis Miller,et al.  Blockchain and the Internet of Things in the Industrial Sector , 2018, IT Professional.

[21]  Peter Robinson,et al.  Requirements for Ethereum Private Sidechains , 2018, ArXiv.

[22]  Amir Herzberg,et al.  Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.

[23]  Ali Dehghantanha,et al.  Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains , 2018, CASCON.

[24]  Michael Mylrea,et al.  Blockchain for Supply Chain Cybersecurity, Optimization and Compliance , 2018, 2018 Resilience Week (RWS).

[25]  Ruchika Malhotra Empirical Research in Software Engineering: Concepts, Analysis, and Applications , 2015 .

[26]  Tyler Moore,et al.  Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.

[27]  Pin Lv,et al.  BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.

[28]  Sidney Amani,et al.  Towards verifying ethereum smart contract bytecode in Isabelle/HOL , 2018, CPP.

[29]  Ali Dehghantanha,et al.  On the Understanding of Gamification in Blockchain Systems , 2018, 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[30]  Maurice Herlihy,et al.  Atomic Cross-Chain Swaps , 2018, PODC.

[31]  Xiapu Luo,et al.  Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).

[32]  Benjamin Aziz,et al.  A Temporal Blockchain: A Formal Analysis , 2016, 2016 International Conference on Collaboration Technologies and Systems (CTS).

[33]  Kei-Léo Brousmiche,et al.  Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[34]  Aviv Zohar,et al.  Bitcoin's Security Model Revisited , 2016, ArXiv.

[35]  Thomas P. Keenan,et al.  Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[36]  Jinan Fiaidhi,et al.  EDI with Blockchain as an Enabler for Extreme Automation , 2018, IT Professional.

[37]  Harry Halpin,et al.  Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).